Wireshark allows the user to put network interface controllers that support promiscuous mode into that mode, in order to see all traffic visible on that interface, not just traffic addressed to one of the interface's configured addresses and broadcast/multicast traffic.

Re: How to trace http links called within programs?

read -p 'what is the name of the program you want to watch? ' pname && netstat -p TCP -veWc |grep $pname

Really though, it is just grep'ing for the string you enter. So, you could just type http or whatever. The -c flag will update every 1 second.

This may not be exacticaly what you are looking for. However, you can now see that by stringing commands together you will be able to get what you want. You may have better luck with tshark instead of netstat (pacman -S wireshark-cli)

Re: How to trace http links called within programs?

hunterthomson, thanks for your suggestions, but this command doesn't work for me:

$ read -p spotify pname && netstat -p TCP -veWc |grep $pname
spotify
Usage: grep [OPTION]... PATTERN [FILE]...
Try 'grep --help' for more information.
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
$

Re: How to trace http links called within programs?

You mean to use adblock? The thing is I already have one running (through hosts file) and I am just adding new addresses when I detect them. The database is huge and I am pretty sure it includes those from Fanboy's Adblock List.